-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Incident Response in the Age of Cloud
By :

Adversaries are using every opportunity that they can find to "penetrate," infect, harm, and disrupt your networks, regardless of whether you are in a traditional IT environment, cloud environment, or hybrid. Threat actors are well aware that even after nearly 50 years of computers being used commonly, IT teams still make misconfiguration mistakes. Looking at the cloud, which is fairly new compared to traditional IT, threat actors know that critical data will be duplicated poorly, and be unprotected and unsupervised in cloud environments. Chapter 11, Incident Response in the Cloud, explored how you can address cybersecurity incidents in the cloud, but here are a few reminders in the context of incident readiness:
Change the font size
Change margin width
Change background colour